DDoS Detection, Mitigation, Orchestration, and Threat Intelligence
Consolidated Security & CGNAT
TLS/SSL Inspection
Web Application Firewall
Application Security & Load Balancing
Analytics & Management
CGNAT & IPv6 Migration
On February 7, A10 Networks disclosed that it had experienced a cybersecurity incident on January 23, 2023. A10 found that certain corporate IT storage systems and devices were the target of a cyberattack for a limited number of hours. We immediately activated our incident response protocols.
As of February 14, we have made progress understanding and recovering from the criminal attack on our network. We believe the incident has been contained based on networking monitoring and forensics. The attacker’s first and last known activity in our network remains January 23.
Our investigation into the impact of the attack continues, with the assistance of Crowdstrike as our key forensics partner, working in conjunction with U.S. authorities and other forensics experts.
At this point, after substantial completion of forensic analysis, the evidence indicates that the criminals removed select data from corporate share drives supporting our internal HR, finance and legal functions, and then deployed malware to encrypt some servers and workstations within our network. This is typical for this type of threat actor.
From the available information, it does not appear that customer technical documents, such as support tickets or our engineering data, were removed from the network.
This breach was not related to any of our products or solutions used by A10’s customers.
We are taking every necessary step to understand and fully restore normal computing operations and will provide further updates.
Seeing is believing. Schedule a live demo today.